Software and hardware does have a use by date. Even though the equipment or software may still appear serviceable, if the vendor stops supplying updates, then the threat actors will start looking for vulnerable unsupported targets. Martin has written about this over on the Octagon Blog this month: Older versions …
Vapor Apps
There are good weeks for some Android users: And then there are bad weeks: Malicious Android ‘Vapor’ apps on Google Play installed 60 million time – BleepingComputer The nature of Android devices can make then vulnerable to cyber-attacks and makes them a target for threat actors. Read about how this …
A good week for Android devices
I have written about the issues with keeping Android device securely patched, especially when contrasted with the Apple approach to iPads and iPhones. You can catch up with these considerations here: Devices and Cyber Security – A Primer | Smart Thinking Solutions This week though I have three good news …
A new week in cyber security news…
After all the “excitement” of CrowdStrike last week, let’s start this week with some good old fashioned bad news cyber security research. Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica Let’s get a definition of Secure Boot from Copilot AI: “Secure Boot …
Devices and Cyber Security – A Primer
I have written a number of articles over the past few weeks about how organisations need to be thinking about theirs’s and their employee’s devices and cyber security. Device Security (Pt. 1) Device Security (Pt. 2) Device Security Just One More Thing… When hardware reaches EOL – Device Security The …
